A Study on Visual Secret Display Student: Ming-Chiang Chen Advisors: Dr. Shyong Jian Shyu and Dr. Kun-Mao Chao 1.

Slides:



Advertisements
Similar presentations
A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
Advertisements

Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Texture Segmentation Based on Voting of Blocks, Bayesian Flooding and Region Merging C. Panagiotakis (1), I. Grinias (2) and G. Tziritas (3)
Image Indexing and Retrieval using Moment Invariants Imran Ahmad School of Computer Science University of Windsor – Canada.
Chih-Hsing Lin, Jia-Shiuan Tsai, and Ching-Te Chiu
Content-based Image Retrieval CE 264 Xiaoguang Feng March 14, 2002 Based on: J. Huang. Color-Spatial Image Indexing and Applications. Ph.D thesis, Cornell.
1 A simple construction of two- dimensional suffix trees in linear time * Division of Electronics and Computer Engineering Hanyang University, Korea Dong.
1 Convolution and Its Applications to Sequence Analysis Student: Bo-Hung Wu Advisor: Professor Herng-Yow Chen & R. C. T. Lee Department of Computer Science.
1 Sorting by Transpositions Based on the First Increasing Substring Concept Advisor: Professor R.C.T. Lee Speaker: Ming-Chiang Chen.
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
1 Image Processing(IP) 1. Introduction 2. Digital Image Fundamentals 3. Image Enhancement in the spatial Domain 4. Image Enhancement in the Frequency Domain.
Speaker: Chi-Yu Hsu Advisor: Prof. Jian-Jung Ding Leveraging Stereopsis for Saliency Analysis, CVPR 2012.
Classification with Hyperplanes Defines a boundary between various points of data which represent examples plotted in multidimensional space according.
Stereo Matching Information Permeability For Stereo Matching – Cevahir Cigla and A.Aydın Alatan – Signal Processing: Image Communication, 2013 Radiometric.
1 A Simpler 1.5- Approximation Algorithm for Sorting by Transpositions Combinatorial Pattern Matching (CPM) 2003 Authors: T. Hartman & R. Shamir Speaker:
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Sorting by Cuts, Joins and Whole Chromosome Duplications
A New Fingertip Detection and Tracking Algorithm and Its Application on Writing-in-the-air System The th International Congress on Image and Signal.
IEEE Int'l Symposium on Signal Processing and its Applications 1 An Unsupervised Learning Approach to Content-Based Image Retrieval Yixin Chen & James.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Stereogram Solver Katya Groisman. What is stereogram? Two-dimensional image, with an optic illusion of depth.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
EECS 730 Introduction to Bioinformatics Microarray Luke Huan Electrical Engineering and Computer Science
Histograms of Oriented Gradients for Human Detection(HOG)
Thinning & Distance Field Advisor : Ku-Yaw Chang Speaker : Jhen-Yu Yang.
Latent Topic Modeling of Word Vicinity Information for Speech Recognition Kuan-Yu Chen, Hsuan-Sheng Chiu, Berlin Chen ICASSP 2010 Hao-Chin Chang Department.
Dr. István Marosi Scansoft-Recognita, Inc., Hungary SSIP 2005, Szeged Character Recognition Internals.
Journal of Visual Communication and Image Representation
1 Using Network Coding for Dependent Data Broadcasting in a Mobile Environment Chung-Hua Chu, De-Nian Yang and Ming-Syan Chen IEEE GLOBECOM 2007 Reporter.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
By Prof. Stelmark. Digital Imaging In digital imaging, the latent image is stored as digital data and must be processed by the computer for viewing on.
Step Construction of Visual Cryptography Schemes IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 Feng Liu, Chuankun.
Rich feature hierarchies for accurate object detection and semantic segmentation 2014 IEEE Conference on Computer Vision and Pattern Recognition Ross Girshick,
Normalized Cuts and Image Segmentation Patrick Denis COSC 6121 York University Jianbo Shi and Jitendra Malik.
On the R ange M aximum-Sum S egment Q uery Problem Kuan-Yu Chen and Kun-Mao Chao Department of Computer Science and Information Engineering, National Taiwan.
T EXT D IGITAL W ATERMARKING O F A M ALAYALAM T EXT D OCUMENT B ASED O N F RAGMENTS R EGROUPING S TRATEGY. Guide:Presented by: Mrs.Sreeja Sasinas Alias.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
南台科技大學 資訊工程系 Region partition and feature matching based color recognition of tongue image 指導教授:李育強 報告者 :楊智雁 日期 : 2010/04/19 Pattern Recognition Letters,
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data Mining Presented by C.C. Chang Dept. of Computer Science and Information.
S.Rajeswari Head , Scientific Information Resource Division
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
The Recent Developments in Visual Cryptography
Image camouflage by reversible image transformation
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Content-based Image Retrieval
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Image Segmentation Techniques
Source: Signal Processing 109 (2015) 317–333
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Hefei Electronic Engineering Institute, Hefei , China
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
The New Developments in Visual Cryptography
Source: Pattern Recognition Vol. 38, May, 2005, pp
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Approximation Algorithms for the Selection of Robust Tag SNPs
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An Efficient Spatial Prediction-Based Image Compression Scheme
Presentation transcript:

A Study on Visual Secret Display Student: Ming-Chiang Chen Advisors: Dr. Shyong Jian Shyu and Dr. Kun-Mao Chao 1

Outline Introduction The Visual Secret Display Problem The Visual Secret Display Problem for One Secret The Visual Secret Display Problem for Multiple Secrets The Visual Secret Display Problem for Color Secret Conclusions 2

Outline Introduction The Visual Secret Display Problem The Visual Secret Display Problem for One Secret The Visual Secret Display Problem for Multiple Secrets The Visual Secret Display Problem for Color Secret Conclusions 3

Motivation Securing the displayed information against the peeping attack 4

The Display and The Mask The display D The decoding mask M (a transparency) Operation: Superimposition  (e.g. D  M ) 5 The pixels in the display and the mask are corresponding. Yamamoto et al., Optics Letters, 2003

Limited Viewing Zone Restricting the visible space P D ( P M ): The size of the display (the mask) d V ( d M ): The distance between the viewing position (the mask) and the display 6 Yamamoto et al., Optics Letters, 2003

Restricting the visible space d M 1 '  2.5cm, d M 2 '  10cm, and d V  125cm Limited Viewing Zone 7

Outline Introduction The Visual Secret Display Problem The Visual Secret Display Problem for One Secret The Visual Secret Display Problem for Multiple Secrets The Visual Secret Display Problem for Color Secret Conclusions 8

The Visual Secret Display (VSD) Problem 9 Given a display D showing the secret P, alter the display D and determine a mask M such that (1) the secret is recognizable from the superimposition of the display and the mask (e.g. D  M ), but (2) totally unrecognizable from either of the display and the mask.

The Visual Secret Display (VSD) Problem 10 For the secret still image, # Secrets# MasksProblemsOur Proposed Schemes 1 1 The (1, 1)-VSD Problem Optical Engineering, 2009 n The ( n, n )-VSD Problem Optical Engineering, 2009 The ( k, n )-VSD Problem Future Works The VSD Problem for General Access Structures In Preparation for Submission nn The (1, n )-VSD Problem for Multiple Secrets Optical Engineering, n -1 n The VSD Problem for Multiple Secrets Optical Engineering, 2009 sn The VSD Problem for Multiple Secrets with General Access Structures In Preparation for Submission #: The number of

Katoh and Imai, IEICE, 1996 Stacking the masks onto the display tightly Kobara and Imai, ASIACRYPT, 1996 Yamamoto et al., Optics Letters, 2003 The concept of limited viewing zone Yamamoto et al., The gray and color secret, multiple masks, and two respective viewing zones. Visual Secret Sharing proposed by Naor and Shamir in 1995 Related Works 11

Visual Secret Sharing 12 P … Share 1 Share 2 Share n Share 3 Share i Selecting an arbitrary share as the display Setting the others as the masks

Our Approach 13 The display shows secret P Mask The display shows secret P but P is unrecognizable For recognizing the secret from the display, producing the required mask

Recognition of the secret P For each pixel p  P, we append a certain pixel at left or right randomly. d : a block of two pixels 0 : white 1 : black r : 0 or 1 randomly : a complementary color of p Visual Effects on Colors 14 d = P

The Decoding Mask 15 The mask contains the windows 0 and the shades 1. The windows: let the corresponding pixels through The shades: block the corresponding pixels d  m = P d = m = [ ] M E = D Rows: shares Columns: the corresponding pixels

Pixel Expansion/Contrast 16 Pixel Expansion: as small as possible Contrast: as high as possible d  m = P d = m = [ ] M D E = Rows: shares Columns: the corresponding pixels

Outline Introduction The Visual Secret Display Problem The Visual Secret Display Problem for One Secret The Visual Secret Display Problem for Multiple Secrets The Visual Secret Display Problem for Color Secret Conclusions 17

The (1, 1)-VSD Problem 18 Given a secret binary image P, determine one display D and one mask M such that (1) P is recognizable from the superimposition of the display and the mask (e.g. D  M ), and (2) P is unrecognizable from either of M and D. D MD M P D M

The ( n, n )-VSD Problem 19 Given a secret binary image P, determine one display D and n masks M 1, M 2, …, M n such that (1) P is recognizable from D  M 1  M 2  …  M n, (2) P is unrecognizable from other possible superimpositions of M 1, M 2, …, M n and D, and (3) P is unrecognizable from either of M 1, M 2, …, M n and D.

n  2 The ( n, n )-VSD Problem 20 P DM1M1 M2M2 D  M 1 D  M 2 M1M2M1M2 D  M 1  M 2

The VSD Problem for General Access Structures 21  : a specification of access structures lists the qualified subsets of M. Given a secret binary image P and a specification , determine one display D and n masks M  { M 1, M 2, …, M n } such that (1) P is recognizable from the superimposition of D and the subset of M in , (2) P is unrecognizable from other possible superimpositions of M 1, M 2, …, M n and D, and (3) P is unrecognizable from either of M 1, M 2, …, M n and D.

22 n  3;   {{2}, {1, 3}} DM1M1 M2M2 M3M3 M1M2M1M2 M1M3M1M3 M2M2M2M2 M1M2M3M1M2M3 DM1DM1 DM2DM2 DM3DM3 DM1M2DM1M2 DM1M3DM1M3 DM2M3DM2M3 DM1M2M3DM1M2M3

Outline Introduction The Visual Secret Display Problem The Visual Secret Display Problem for One Secret The Visual Secret Display Problem for Multiple Secrets The Visual Secret Display Problem for Color Secret Conclusions 23

The (1, n)-VSD Problem for Multiple Secrets 24 Given n secret binary images P 1, P 2, …, P n, determine one display D and n masks M 1, M 2, …, M n such that (1) P i is recognizable from D  M i, 1  i  n, (2) P i is unrecognizable from other possible superimpositions of M 1, M 2, …, M n and D, and (3) P i is unrecognizable from either of M 1, M 2, …, M n and D.

n  2 The (1, n)-VSD Problem for Multiple Secrets 25 P1P1 DM1M1 M2M2 D  M 1 D  M 2 P2P2

The VSD Problem for Multiple Secrets 26 Given 2 n -1 secret binary images P 1, P 2, …, P 2 n -1, determine one display D and n masks M  { M 1, M 2, …, M n } such that (1) P i is recognizable from the superimposition of D and a combination of elements of M, 1  i  2 n - 1, (2) P i is unrecognizable from other possible superimpositions of M 1, M 2, …, M n and D, and (3) P i is unrecognizable from either of M 1, M 2, …, M n and D.

The VSD Problem for Multiple Secrets 27 n  2 DM1M1 M2M2 D  M 1 D  M 2 D  M 1  M 2

Outline Introduction The Visual Secret Display Problem The Visual Secret Display Problem for One Secret The Visual Secret Display Problem for Multiple Secrets The Visual Secret Display Problem for Color Secret Conclusions 28

Recognition of the secret P For each pixel p  P, we append a complementary pixel at left or right randomly. Visual Effects on Colors 29 P d =

Recognition of the secret P For each pixel p  P, we append other colors in the palette  at left or right randomly. Visual Effects on Colors 30 d =

n  2 The VSD Problem for Color Secret 31 DM1M1 M2M2 D  M 1 D  M 2 D  M 1  M 2

Only the display contains whole secret color information, and the mask has the windows and the shades merely. The VSD Problem for Color Secret 32 DM1M1

Conclusions 33

The Visual Secret Display Problem 34 Fundamental color features to the human visual system # Secrets# MasksProblemsOur Proposed Schemes 1 1 The (1, 1)-VSD Problem Optical Engineering, 2009 n The ( n, n )-VSD Problem Optical Engineering, 2009 The ( k, n )-VSD Problem Future Works The VSD Problem for General Access Structures In Preparation for Submission nn The (1, n )-VSD Problem for Multiple Secrets Optical Engineering, n -1 n The VSD Problem for Multiple Secrets Optical Engineering, 2009 sn The VSD Problem for Multiple Secrets with General Access Structures In Preparation for Submission #: The number of

The ( k, n )-VSD Problem 35 Given a secret binary image P, determine one display D and n masks M 1, M 2, …, M n such that (1) P is recognizable from D  M i 1  M i 2  …  M i q, with q  k, (2) P is unrecognizable from D  M i 1  M i 2  …  M i q, q < k, and (3) P is unrecognizable from either of M 1, M 2, …, M n and D, where 1  i  n.

Optimization on Pixel Expansion/Contrast 36 Pixel Expansion: as small as possible Minimize the pixel expansion Contrast: as high as possible Maximize the contrast By using Integer linear programming P D MD MM D

Thank you for listening 37

38 Matthias Bernt, Kuan-Yu Chen, Ming-Chiang Chen, An-Chiang Chu, Daniel Merkle, Hung-Lung Wang, Kun-Mao Chao, and Martin Middendorf, Finding All Sorting Tandem Duplication Random Loss Operations, Journal of Discrete Algorithms, submitted. Shyong Jian Shyu, Ming-Chiang Chen, and Kun-Mao Chao, Securing Information Display for Multiple Secrets, Optical Engineering, Vol. 48, No. 5, pp , Cheng-Wei Luo, Ming-Chiang Chen, Yi-Ching Chen, Roger W.L. Yang, Hsiao-Fei Liu, and Kun-Mao Chao, Linear-Time Algorithms for the Multiple Gene Duplication Problems, IEEE/ACM Transactions on Computational Biology and Bioinformatics, accepted. Matthias Bernt, Ming-Chiang Chen, Daniel Merkle, Hung-Lung Wang, Kun-Mao Chao, and Martin Middendorf, Finding All Sorting Tandem Duplication Random Loss Operations, Combinatorial Pattern Matching (CPM), pp , Ming-Chiang Chen and Richard Chia-Tung Lee, Sorting by Transpositions Based on the First Increasing Substring Concept, IEEE International Symposium on BioInformatics and BioEngineering (BIBE), pp , Tung-Shou Chen and Ming-Chiang Chen, A New Search Engine for Chinese Document Image Retrieval Based on Chinese Character Segmentation Features, Journal of Computer Processing of Oriental Languages, Special Issue on WAP and WEB, Vol. 15, No. 4, pp , Tung-Shou Chen, Kwang-Fu Li, and Ming-Chiang Chen, Using Segmentation Feature of Characters for Content-Based Retrieval System of Chinese Document Images, Pan-Yellow-Sea International Workshop on Information Technologies for Network Era (PYIWIT), Japan, Publications

Supplements 39

The Display and The Mask The display D The decoding mask M (a transparency) Operation: Superimposition  (e.g. D  M ) 40

The Display and The Mask The display D The decoding mask M (a transparency) Operation: Superimposition  (e.g. D  M ) 41 The pixels in the display and the mask are corresponding.

Pixel Expansion/Contrast 42 Pixel Expansion: as small as possible Contrast: as high as possible d  m = P d = m = [ ] M D E = Rows: shares Columns: the corresponding pixels